{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T15:08:44Z","timestamp":1744902524667},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540741701"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74171-8_63","type":"book-chapter","created":{"date-parts":[[2007,7,30]],"date-time":"2007-07-30T09:13:08Z","timestamp":1185786788000},"page":"636-645","source":"Crossref","is-referenced-by-count":1,"title":["A Security Steganography Method for Lossy Compression Gray Scale Image"],"prefix":"10.1007","author":[{"given":"Ziwen","family":"Sun","sequence":"first","affiliation":[]},{"given":"Zhicheng","family":"Ji","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"63_CR1","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"F.A.P. Petitcolas","year":"1999","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding-A Survey. Proceeding of IEEE\u00a087(7), 1062\u20131078 (1999)","journal-title":"Proceeding of IEEE"},{"issue":"3","key":"63_CR2","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N. Provos","year":"2003","unstructured":"Provos, N., Honeyman, P.: Hide and Seek. IEEE Security & Privacy Magazine\u00a01(3), 32\u201344 (2003)","journal-title":"IEEE Security & Privacy Magazine"},{"key":"63_CR3","unstructured":"Provos, N., Honeyman, P.: Detecting Steganographic Content on the Internet. In: Proc. 2002 Network and Distributed System Security Symp, San Diego, CA (2002)"},{"key":"63_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/BFb0024619","volume-title":"Information Hiding","author":"B. Pfitzmann","year":"1996","unstructured":"Pfitzmann, B.: Information hiding terminology. In: Anderson, R. (ed.) Information Hiding. LNCS, vol.\u00a01174, pp. 347\u2013350. Springer, Heidelberg (1996)"},{"issue":"4","key":"63_CR5","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Petitcolas, F.A.P.: On The Limits of Steganography. IEEE Journal of Seleced Areas in Communications\u00a016(4), 474\u2013481 (1998)","journal-title":"IEEE Journal of Seleced Areas in Communications"},{"key":"63_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, T., Ping, X.J.: A Fast and Effective Steganalytic Technique against JSteg-like Algorithms. In. Proceedings of ACM Symposium on Applied Computing, Florida, USA, pp. 307-311 (March 2003)","DOI":"10.1145\/952532.952595"},{"key":"63_CR7","unstructured":"Provos, N.: Defending Against Statistical Steganalysis. In: Proceedings of the 10th USENIX Security Symposium, Washington, pp. 323-325 (2001)"},{"key":"63_CR8","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House (2000)","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"63_CR9","unstructured":"Zhao, J., Koch, E.: Embedding Robust Labels into Images for Copyright Protection. In: Proc.of the Int.Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Techniques, Austria, Vienna, pp. 242-251 (1995)"},{"issue":"6","key":"63_CR10","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1142\/S021800140300268X","volume":"17","author":"Y.K. Lee","year":"2003","unstructured":"Lee, Y.K., Chen, L.H.: Secure Error-Free Steganography for JPEG Images. International Journal of Pattern Recognition and Artifial Intelligence\u00a017(6), 967\u2013981 (2003)","journal-title":"International Journal of Pattern Recognition and Artifial Intelligence"},{"key":"63_CR11","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1016\/j.patrec.2005.09.008","volume":"27","author":"H. Noda","year":"2006","unstructured":"Noda, H., Niimi, M., Kawguchi, E.: High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recongnition Letters\u00a027, 455\u2013461 (2006)","journal-title":"Pattern Recongnition Letters"},{"key":"63_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/3-540-49380-8_24","volume-title":"Information Hiding","author":"J. Z\u00f6llner","year":"1998","unstructured":"Z\u00f6llner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the Security of Steganographic Systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 344\u2013354. Springer, Heidelberg (1998)"},{"key":"63_CR13","doi-asserted-by":"crossref","unstructured":"Kim, Y., Duric, Z., Richards, D.: Limited Distortion in LSB Steganography. Security, Steganography, and Watermarking of Multimedia Content VIII. In: Delp III, E.J., Wong, P.W. (eds.) Proceedings of the SPIE, vol.\u00a06072, pp. 248\u2013256 (2006)","DOI":"10.1117\/12.650169"},{"issue":"2","key":"63_CR14","first-page":"99","volume":"8","author":"C.H. Kao","year":"2005","unstructured":"Kao, C.H., Hwang, R.J.: Information Hiding in Lossy Compression Gray Scale Image. Tamkang Journal of Science and Engineering\u00a08(2), 99\u2013108 (2005)","journal-title":"Tamkang Journal of Science and Engineering"},{"issue":"4","key":"63_CR15","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/103085.103089","volume":"34","author":"G.K.. Wallace","year":"1991","unstructured":"Wallace, G.K.: The JPEG Still Picture Compression Standard. Communications of the ACM\u00a034(4), 30\u201344 (1991)","journal-title":"Communications of the ACM"},{"key":"63_CR16","unstructured":"USC-SIPI Image Databse, http:\/\/sipi.usc.edu\/services\/database\/Database.html"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74171-8_63.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:18:50Z","timestamp":1605763130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74171-8_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540741701"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74171-8_63","relation":{},"subject":[]}}